![](/user_photo/1438_p9ksI.png)
Cisco. Fundamentals Network Design - Cisco Press
.pdf![](/html/1438/356/html_mz7kiDGgDq.2Ghf/htmlconvd-hfzHaC121x1.jpg)
Understanding and Defining BGP Routing Policies
Figure 3-39 imple route reflector example.
Without a route reflector, the network shown in Figure 3-39 would require a full IBGP mesh (that is, Router A would have to be a peer of Router B). If Router C is configured as a route reflector, IBGP peering between Routers A and B is not required because Router C will reflect updates from Router A to Router B and from Router B to Router A. To configure Router C as a route reflector, use the following commands:
!Router C router bgp 100
neighbor 1.1.1.1 remote-as 100
neighbor 1.1.1.1 route-reflector-client neighbor 2.2.2.2 remote-as 100
neighbor 2.2.2.2 route-reflector-client
The router whose configuration includes neighbor route-reflector-client router configuration commands is the route reflector. The routers identified by the neighbor route-reflector-client commands are clients of the route reflector. When considered as a whole, the route reflector and its clients are called a cluster. Other IBGP peers of the route reflector that are not clients are called nonclients.
An AS can have more than one route reflector. When an AS has more than one route reflector, each route reflector treats other route reflectors as normal IBGP speakers. There can be more than one route reflector in a cluster, and there can be more than one cluster in an AS.
Route Flap Dampening
Route flap dampening (introduced in Cisco IOS Release 11.0) is a mechanism for minimizing the instability caused by route flapping. The following terms are used to describe route flap dampening:
Designing Large-Scale IP Internetworks 3-63
![](/html/1438/356/html_mz7kiDGgDq.2Ghf/htmlconvd-hfzHaC122x1.jpg)
Summary
•Penalty—A numeric value that is assigned to a route when it flaps.
•Half-life time—A configurable numeric value that describes the time required to reduce the penalty by one half.
•Suppress limit—A numeric value that is compared with the penalty. If the penalty is greater than the suppress limit, the route is suppressed.
•Suppressed—A route that is not advertised even though it is up. A route is suppressed if the penalty is more than the suppressed limit.
•Reuse limit—A configurable numeric value that is compared with the penalty. If the penalty is less than the reuse limit, a suppressed route that is up will no longer be suppressed.
•History entry—An entry that is used to store flap information about a route that is down.
A route that is flapping receives a penalty of 1000 for each flap. When the accumulated penalty reaches a configurable limit, BGP suppresses advertisement of the route even if the route is up. The accumulated penalty is decremented by the half-life time. When the accumulated penalty is less than the reuse limit, the route is advertised again (if it is still up).
Summary of BGP
The primary function of a BGP system is to exchange network reachability information with other BGP systems. This information is used to construct a graph of AS connectivity from which routing loops are pruned and with which AS-level policy decisions are enforced. BGP provides a number of techniques for controlling the flow of BGP updates, such as route, path, and community filtering. It also provides techniques for consolidating routing information, such as CIDR aggregation, confederations, and route reflectors. BGP is a powerful tool for providing loop-free interdomain routing within and between ASs.
Summary
Recall the following design implications of the Enhanced Interior Gateway Routing Protocol (IGRP), Open Shortest Path First (OSPF) protocols, and the BGP protocol:
•
•
•
•
•
•
Network topology
Addressing and route summarization
Route selection
Convergence
Network scalability
Security
This chapter outlined these general routing protocol issues and focused on design guidelines for the specific IP protocols.
3-64 Internetwork Design Guide
![](/html/1438/356/html_mz7kiDGgDq.2Ghf/htmlconvd-hfzHaC123x1.jpg)
C H A P T E R 4
Designing SRB Internetworks
This chapter discusses source-route bridging (SRB) and remote source-route bridging (RSRB). SRB is evaluated within two contexts: Systems Network Architecture (SNA) and NetBIOS.
When IBM developed SRB technology in the mid-eighties, it was viewed as a local technology that would interconnect a few rings and terminate at a remote 3745. The challenge for any SRB internetwork occurs when the scale exceeds what was originally intended by IBM. This technology encounters problems when non-IBM protocols are required to coexist with native Token Ring traffic. Source-route bridges were intended to be the primary internetworking tool for creating a corporate-wide Token Ring internetwork. These bridges were never meant to scale to the level that many customers require. This chapter addresses the challenges of this environment and aims to help network designers successfully implement SRB within a large, multiprotocol topology. This chapter is grouped into the following topics:
•
•
•
SRB technology and implementation overview
Internet Protocol (IP) routing protocol selection and implementation
SRB network design recommendations and guidelines
Note For information concerning IBM serial line connections, refer to Appendix B, “IBM Serial Link Implementation Notes.”
SRB Technology Overview and Implementation Issues
The following discussions address SRB-related technology, features provided to support SRB requirements, and implementation issues that can affect large-scale, router-based SRB networks. Specific topics include the following:
•
•
•
•
•
•
•
•
•
Typical SRB Environments
Multiport Bridging
Explorer Packets and Propagation
NetBIOS Broadcast Handling
LAN Framing
WAN Framing
WAN Parallelism
WAN Frame Sizes
SNA Host Configuration Considerations for SRB
Designing SRB Internetworks 4-1
![](/html/1438/356/html_mz7kiDGgDq.2Ghf/htmlconvd-hfzHaC124x1.jpg)
SRB Technology Overview and Implementation Issues
Note If you have eight or fewer routers operating as SRBs, you can skip this chapter. You probably do not need to tune your network.
Typical SRB Environments
SRB is used in three types of user environments:
•Many end stations to few end stations (hierarchical)—In a hierarchical SNA network, end users from multiple access sites need connectivity to a host site through a limited number of front-end processors (FEPs).
•Many end stations to several end stations (distributed)—Many users need to access a limited number of servers or a limited number of devices, such as an AS/400.
•Any-to-any (flat) —End users at one site need to access end stations at another site.
The following discussions evaluate SRB environment design issues in relation to these user environments.
Multiport Bridging
The fundamental design of an SRB, as initially created by IBM, was a two-port, ring-to-bridge- to-ring combination. IBM also created a half-bridge configuration that consisted of a ring-to-wide-area-network (WAN) combination followed by a second WAN-to-ring half-bridge combination.
To support more than two rings, multiport routers adopt an implementation that allows SRBs to include multiple rings on a single internetworking node. This is accomplished via the virtual ring capability. A virtual ring is a conceptual entity that connects two or more physical rings together, locally or remotely.
Figure 4-1 illustrates the concept of multiport bridges and a virtual ring.
4-2 Cisco CCIE Fundamentals: Network Design
![](/html/1438/356/html_mz7kiDGgDq.2Ghf/htmlconvd-hfzHaC125x1.jpg)
Multiport Bridging
Figure 4-1 Multiport bridge using virtual ring concept to permit multiple ring interconnection.
Token
Ring
Router
Token |
Virtual ring |
Token |
Ring |
|
Ring |
Token
Ring
The concept of virtual rings can be expanded across router boundaries. A large virtual ring can connect several access points to a central router with an FEP. Figure 4-2 illustrates this expansion.
Figure 4-2 Virtual rings expanded across an IP cloud.
Token
Ring
|
|
IP cloud |
Token |
Virtual |
Token |
Ring |
ring |
Ring |
Token
Ring
Routers support simple bridging, multiport bridging, and connections to both local and remote virtual rings. A virtual ring configuration is required to communicate with remote rings. The half-bridge configuration is not supported. The IBM half bridge does not use the concept of virtual rings; two IBM half bridges use two rings. The virtual ring advantage is in a topology that features many SRBs. In such an arrangement, only a single unit is required at a central site.
Designing SRB Internetworks 4-3
![](/html/1438/356/html_mz7kiDGgDq.2Ghf/htmlconvd-hfzHaC126x1.jpg)
SRB Technology Overview and Implementation Issues
Remote virtual rings have a property not found in physical ring topologies: The logical connectivity is determined by the network administrator. Two options are available: partially meshed topologies (sometimes called redundant star topologies) or fully meshed topologies. In a partially meshed topology, a single central location (such as an FEP Token Ring) is connected to all access locations. Each access location is logically connected to the central FEP rings and is not connected to any other ring. Partially meshed topologies using virtual rings do not permit direct communication between remote rings. However, communication is allowed from the central ring to the remote rings, which also allows communication among remote rings through the central ring.
In a fully meshed virtual ring topology, any ring can communicate with any other ring. Figure 4-3 and Figure 4-4 illustrate partially meshed and fully meshed topologies. In the partially meshed topology depicted in Figure 4-3, all rings are logically bridged to Token Ring 10. The access rings are not bridged together. In the fully meshed topology illustrated in Figure 4-4, all rings are bridged to all other rings.
Figure 4-3 Typical hierarchical topology.
Token
Ring 10
Virtual ring
Token |
Token |
Ring 20 |
Ring 60 |
Token |
Token |
Ring 30 |
Ring 50 |
|
Token |
Ring 40
In the topology illustrated in Figure 4-3, each of the access routers is a peer to the FEP router. They are not peers to one another. Thus, SRB is enabled between all rings and Token Ring 10 and is not enabled between token rings 20, 30, 40, 50 and 60.
Assuming this is only a hierarchical SNA environment, users connected to these rings do not have SRB connectivity. Broadcasts are not forwarded across the lower layer rings (token rings 20 through 60); broadcasts are sent only from Token Ring 10 to or from the other rings.
In the topology illustrated in Figure 4-4, each router is a peer to each other router. All rings are logically bridged to all other rings. The actual physical topology is less important than the logical topology. In Figure 4-4, the same logical topology can exist even if there are no physical connections between the access routers.
4-4 Cisco CCIE Fundamentals: Network Design
![](/html/1438/356/html_mz7kiDGgDq.2Ghf/htmlconvd-hfzHaC127x1.jpg)
Explorer Packets and Propagation
Figure 4-4 Typical fully meshed (flat) topology.
Token
Ring 10
Virtual ring
Token |
Token |
Ring 20 |
Ring 60 |
Token |
Token |
Ring 30 |
Ring 50 |
|
Token |
Ring 40
Explorer Packets and Propagation
Once you build a network of ring and bridge combinations, you must have a method for the end stations to find other end stations in the network.
An IBM bridge uses a system of explorer packet marking to propagate routing information through an SRB internetwork. The explorer packet is produced by the source end station and is marked (updated) by each bridge that it traverses. The marked field is called the Routing Information Field (RIF). Two important transactions occur in the explorer packet handling exchange: the transmission of the explorer packet and the reply by the end station to the explorer packets that it receives.
In this environment, the source end stations must know the Token Ring Media Access Control (MAC) address of the destination end stations. Once the MAC address is understood, the source end station produces an explorer packet.
The source-route bridge updates the explorer packet to include its bridge-ring combination in the explorer packet’s RIF in the MAC frame. By accumulating this information, the explorer packet gathers a hop-by-hop description of a path through the SRB network. In addition, the bridge forwards the explorer to each destination ring it encounters, therefore creating a complete topological map for each end station trying to find its way through the network.
Explorer Packet Types
There are three types of explorer packets: local explorer packets, spanning explorer packets, and all-routes explorer packets. Note that all-routes explorer packets are also known as all-rings explorer packets, and spanning explorer packets are also known as single-route and limited-route explorer packets. Single router explorers are explorers that pass through a predetermined path constructed by a spanning tree algorithm in the bridge. A station should receive only one single router explorer from the network.
Designing SRB Internetworks 4-5
![](/html/1438/356/html_mz7kiDGgDq.2Ghf/htmlconvd-hfzHaC128x1.jpg)
SRB Technology Overview and Implementation Issues
A local explorer packet is generated by some end systems (either NetBIOS or SNA) to find a host connected to the local ring. After this event has occurred without finding a local host, the end station produces either a spanning explorer or an all-routes explorer packet. This behavior depends on the type of end station. SNA end stations generally produce an all-routes explorer packet. NetBIOS end stations produce a spanning explorer packet.
Note As of Cisco IOS Software Release 10.2, auto spanning tree (AST) for SRB is supported. The implementation of AST in Cisco IOS Software Release10.2 is based on the IEEE 802.1 standard and is fully compatible with IBM PC bridging. New global and interface configuration commands are required to configure a router for AST. Once configured, AST can be enabled and disabled through LAN Network Manager (LNM). The following discussion of spanning tree explorer packets applies to the manual spanning tree functionality available in software releases prior to Cisco IOS Software Release 10.2.
To pass a spanning explorer packet on a router, the configuration for the router’s Token Ring interface must have the source-bridge spanning interface configuration command for the specific ring. If this interface command is not included, spanning explorer packets are discarded.
In contrast, an all-routes explorer packet can find any valid SRB ring. No specific router configuration other than specification of SRB is required to pass all-routes explorer packets.
Explorer packet processing works as illustrated in Figure 4-5. If End station X sends an all-routes explorer packet, Bridge B1 and Bridge B2 both forward the explorer packet. End station Y receives two all-routes explorer packets in this configuration. End station Y responds to each of the all-routes explorer packets by sending a directed, nonbroadcast packet. In the example illustrated in Figure 4-5, four packets are generated:
•
•
Two all-routes explorer packets inbound (to End station Y)
Two nonbroadcast packets outbound (from End station Y)
Figure 4-5 Explorer packet processing (all-routes broadcast).
Bridge B1
All-routes explorer packet sent by End station X
|
|
|
|
Token |
Token |
|
|
|
|
|
||
|
|
|
|
|
|
|||||||
|
||||||||||||
|
|
|
|
Ring 1 |
Ring 2 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
||||||||
End station X |
|
End station Y |
||||||||||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Directed, nonbroadcast packet |
|||||||
|
|
|
|
Bridge B2 |
sent by End station Y |
Figure 4-6 illustrates an end station sending a spanning explorer packet. Bridge B1 and Bridge B2 make their respective forwarding decisions based on whether or not spanning is enabled. Assume Bridge B1 has spanning enabled and Bridge B2 does not have spanning enabled. Bridge B1 forwards the spanning explorer packet, and Bridge B2 does not. End station Y receives one spanning explorer packet and returns an all-routes explorer packet for each single route received. As before, Bridge B1 and Bridge B2 forward the all-routes explorer packet. In this example, the following packets are generated:
•
•
One spanning explorer packet inbound (to End station Y)
Two all-routes explorer packets outbound (to End station X)
4-6 Cisco CCIE Fundamentals: Network Design
![](/html/1438/356/html_mz7kiDGgDq.2Ghf/htmlconvd-hfzHaC129x1.jpg)
Explorer Packets and Propagation
Figure 4-6 Explorer packet processing (spanning explorer broadcast).
Bridge B1
Spanning explorer packet sent by End station X
|
|
|
|
Token |
Token |
|
|
||||||
|
|
|
|
Ring 1 |
Ring 2 |
|
|
|
|
|
|
||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|||
End station X |
|
End station Y |
|||||||||||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
All-routes explorer packet |
||||||||
|
|
|
|
Bridge B2 |
sent by End station Y |
If spanning were enabled on Bridge B2, it would also forward the spanning explorer packet. The following packets would be generated:
•
•
Two spanning explorer packets inbound (to End station Y)
Four all-routes explorer packets outbound (to End station X)
Note In general, there should be only a single path through the network for spanning explorer packets. If redundancy is required, a trade-off should be made between automatic redundancy and tolerance for additional explorer packet traffic. When redundancy is required, AST should be used.
Redundancy can be achieved in many instances within the router-based cloud as a result of encapsulation in either TCP or IP, the latter called Fast Sequenced Transport (FST). To contrast redundancy provided by a pure SRB environment and an internetwork that combines routing capabilities with SRBs, consider the networks illustrated in Figure 4-7, Figure 4-8, and Figure 4-9. Figure 4-7 illustrates a pure bridged network. Figure 4-8 and Figure 4-9 illustrate an SRB network running over routers.
Designing SRB Internetworks 4-7
![](/html/1438/356/html_mz7kiDGgDq.2Ghf/htmlconvd-hfzHaC130x1.jpg)
SRB Technology Overview and Implementation Issues
Figure 4-7 Redundancy in a pure SRB network.
|
Token |
|
Ring 30 |
Bridge B2 |
Bridge B1 |
Split Bridge B2 |
Split Bridge B1 |
over serial link |
over serial link |
Bridge B2 |
Bridge B1 |
|
|
|
|
Token |
Token |
|
|
|
|
|
|
|
|
|
|||
|
|
|
|
Ring 10 |
Ring 20 |
|
|
|
|
|
|
|
|||||
|
|
|
|
|
|
|
||
|
|
|
|
|
|
|
|
|
Client |
Server |
|||||||
|
|
|
|
Bridge B3 |
Bridge B3 |
Split Bridge B3 over serial link
In Figure 4-7, there are two SRB paths between Token Ring 10 and Token Ring 20:
•Token Ring 10 to split Bridge B3 to Token Ring 20
•Token Ring 10 to split Bridge B2 to Token Ring 30 to split Bridge B1 to Token Ring 20
If spanning is enabled on both paths, the traffic resulting from a spanning explorer broadcast from the server is as follows:
•
•
Two spanning explorer packets inbound (to the server)
Four all-routes explorer packets outbound (to the client)
In router-based networks, the same type of redundancy is achieved in a different, more efficient manner, as illustrated in Figure 4-8 and Figure 4-9.
Figure 4-8 Redundancy in a router-based SRB network (physical router connectivity).
Token
Ring 30
Router B
Router A |
Router C |
Token |
Token |
Ring 10 |
Ring 20 |
Client |
Server |
4-8 Cisco CCIE Fundamentals: Network Design